Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
This Learning Path is your comprehensive guide to making machine data accessible across your organization using advanced dashboards. With over 80 realistic examples, you'll get several recipes to use Splunk and transform your data into business-critical insights.
- PDF + ePub + Mobi pkt
Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights Improving Your Splunk Skills. Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights
-
This book will cover all the new features that have been introduced in TensorFlow 2.0 especially the major highlight, including eager execution and more. You will learn how to make the best use of these features to migrate your codes from TensorFlow 1.x to TensorFlow 2.0 in a seamless way.
- PDF + ePub + Mobi pkt
What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning What's New in TensorFlow 2.0. Use the new and improved features of TensorFlow to enhance machine learning and deep learning
-
With this book, you will learn to write production-ready smart contracts for the Ethereum blockchain. Finally, with the help of comprehensive examples, you will learn how to add security to smart contracts and then delve into the various security considerations that must be paid attention to.
- PDF + ePub + Mobi pkt
Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity Mastering Blockchain Programming with Solidity. Write production-ready smart contracts for Ethereum blockchain with Solidity
-
This Learning Path is your easy reference to know all about penetration testing or ethical hacking. With more than 100 recipes, you'll become a master of the most widely used penetration testing framework and easily tackle command injection flaws, crypto implementation layers, and web application security holes.
- PDF + ePub + Mobi pkt
Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit Improving your Penetration Testing Skills. Strengthen your defense against web attacks with Kali Linux and Metasploit
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh
-
Cyber-attacks, in their various forms, are increasing in frequency and complexity, causing potential losses to organizations. This book equips readers with the skills required to succeed at 210-255 SECOPS exam, and for those re-sitting, to understand their score report and quickly identify the appropriate sections to concentrate on.
- PDF + ePub + Mobi pkt
CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate CCNA Cyber Ops : SECOPS - Certification Guide 210-255. Learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate
-
This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure your i
- PDF + ePub + Mobi pkt
The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit The Complete Metasploit Guide. Explore effective penetration testing techniques with Metasploit
-
With Red Hat Enterprise Essentials you will run and operate Red Hat Linux 8 learn to securely administer a server or a system using Linux commands.
- ePub pkt
Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems Red Hat Enterprise Linux 8 Essentials. Learn to install, administer and deploy RHEL 8 systems
-
Malware analysis is a powerful investigation technique widely used in various security areas including digital forensics and incident response processes. Working through practical examples, you'll be able to analyze any type of malware you may encounter within the modern world.
- PDF + ePub + Mobi pkt
Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks Mastering Malware Analysis. The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
-
A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF). This book teaches you various penetration testing techniques in order to become
- PDF + ePub + Mobi pkt
Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills Learn Penetration Testing. Understand the art of penetration testing and develop your white hat hacker skills
-
ABAP is an established and complex programming language in the IT industry. This book will give you confidence in using the latest ABAP programming techniques and applying legacy constructions with the help of practical examples.
- PDF + ePub + Mobi pkt
Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP
-
Starting with the technical foundations of blockchain, this Learning Path takes you deep into the theoretical and technical foundations of the technology to transform you into an expert of decentralized applications and blockchain.
- PDF + ePub + Mobi pkt
Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions Advanced Blockchain Development. Build highly secure, decentralized applications and conduct secure transactions
-
This essential guide will help any blockchain practitioner gain expertise in developing complete STO and stablecoins DApps. This book provides a quick introduction to basic ICO and STO concepts, and their differences. It will also help readers compile, test, and deploy their own contracts by altering the code provided in the book.
- PDF + ePub + Mobi pkt
Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications Security Tokens and Stablecoins Quick Start Guide. Learn how to build STO and stablecoin decentralized applications
-
This Learning Path focuses on showing you how to leverage the benefits of the cloud and create applications that are high in performance and availability. It teaches you everything you need to know for designing industry-grade cloud applications and efficiently migrating your business to the cloud.
- PDF + ePub + Mobi pkt
Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud Architecting Cloud Native Applications. Design high-performing and cost-effective applications for the cloud
-
C# and .NET Core makes network programming the enjoyable experience it should be. This book will get you started with the basics of network programming as they relate to C#. We will then dig into the core topics of the network layer. You'll also learn to make sockets connections as well and develop practical client-side applications in this book.
- PDF + ePub + Mobi pkt
Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core Hands-On Network Programming with C# and .NET Core. Build robust network applications with C# and .NET Core
-
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.
- PDF + ePub + Mobi pkt
Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition Kali Linux - An Ethical Hacker's Cookbook. Practical recipes that combine strategies, attacks, and tools for advanced penetration testing - Second Edition
-
This Learning Path is your easy reference to explore and build blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer. Starting with the basics of blockchain, this Learning Path teaches you all that you need to know to develop your own private and public blockchain networks.
- PDF + ePub + Mobi pkt
Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer Blockchain Development with Hyperledger. Build decentralized applications with Hyperledger Fabric and Composer
Salman A. Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, Venkatraman Ramakrishna, Weimin Sun, Xun (Brian) Wu
-
Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. With this course, you will learn and implement various network assessment techniques and best practices that can help you build a robust security framework for your organization.
- PDF + ePub + Mobi pkt
Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7 Securing Network Infrastructure. Discover practical network security with Nmap and Nessus 7
-
Mastering Distributed Tracing provides comprehensive coverage of the tracing field. Solve problems through code instrumentation with open standards, and learn how to profile complex systems. The book will also prepare you to operate and enhance your own tracing infrastructure.
- PDF + ePub + Mobi pkt
Mastering Distributed Tracing. Analyzing performance in microservices and complex systems Mastering Distributed Tracing. Analyzing performance in microservices and complex systems
-
Data structures and algorithms help you to understand computational complexity and write efficient code. Kotlin data structures and algorithms enable you to write code that runs faster which is important in the web and mobile world. This book takes you through the techniques that you can use in your regular production environment.
- PDF + ePub + Mobi pkt
Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works Hands-On Data Structures and Algorithms with Kotlin. Level up your programming skills by understanding how Kotlin's data structure works
-
Using Burp Suite, you can quickly build proof of concepts, extract data via an exploit, attack multiple end points in an application and even begin to script complex multi stage attacks. This book will provide a hands-on coverage on how you can get started with executing an application penetration test and be sure of the results.
- PDF + ePub + Mobi pkt
Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications Hands-On Application Penetration Testing with Burp Suite. Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
-
Unreal Engine VR Quick Start Guide introduces designers to the guidelines and design processes necessary to build interactive VR experiences. Learn to use User Experience design techniques and Blueprint programming to create virtual reality gameplay for HTC Vive, Oculus Rift, PSVR, and Windows Mixed Reality headsets.
- PDF + ePub + Mobi pkt
Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4 Unreal Engine Virtual Reality Quick Start Guide. Design and Develop immersive virtual reality experiences with Unreal Engine 4
-
With this Learning Path, you will be able to easily solve complex programming challenges using advanced features of C#. You'll structure and build scalable, optimized, and robust applications in C#7 and .NET, and with the newly-acquired TDD skills, you'll be ready to enter the market not only as a C# pro, but also as a TDD expert.
- PDF + ePub + Mobi pkt
Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C# Improving your C# Skills. Solve modern challenges with functional programming and test-driven techniques of C#
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
-
This book is for Python developers to implement various components of end-to-end decentralized applications such as cryptocurrencies, smart contracts, wallet and more. You will use the example-based approach using various libraries from Python ecosystem to build efficient and powerful blockchain applications at work or projects.
- PDF + ePub + Mobi pkt
Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python Hands-On Blockchain for Python Developers. Gain blockchain programming skills to build decentralized applications using Python
-
Security automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.
- PDF + ePub + Mobi pkt
Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps Practical Security Automation and Testing. Tools and techniques for automated security scanning and testing in DevSecOps
-
Adrian Pruteanu adopts the mindset of both a defender and an attacker in this practical guide to web application testing. By giving key insights into attack vectors and defenses, Becoming the Hacker builds your ability to analyze from both viewpoints and create robust defense strategies.
- PDF + ePub + Mobi pkt
Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker Becoming the Hacker. The Playbook for Getting Inside the Mind of the Attacker
-
This book is a blend of penetration testing and best practices industrial automation in cybersecurity space with Python. This book will enable pentesters to take their skills to the next level by leveraging the power of Python and explaining the core concepts that will come in handy when making robust cybersecurity tools and custom exploits.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems Hands-On Penetration Testing with Python. Enhance your ethical hacking skills to build automated and intelligent systems
-
Microsoft Azure has numerous effective solutions but the biggest challenge that architects and administrators face is implementing these solutions appropriately. This Learning Path focuses on various scenarios that will help overcome the challenge of implementing Azure solutions while helping you prepare for the Microsoft Architect exam.
- PDF + ePub + Mobi pkt
Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure Implementing Azure: Putting Modern DevOps to Use. Transform your software deployment process with Microsoft Azure
Florian Klaffenbach, Oliver Michalski, Markus Klein, Mohamed Waly, Namit Tanasseri, Rahul Rai
-
Learning Python for Forensics, Second Edition begins by introducing you to the fundamentals of Python. You will learn how to develop Python scripts through an iterative design. This book will also help you strengthen your analysis skills and efficiency as you creatively solve real-world problems through instruction-based tutorials.
- PDF + ePub + Mobi pkt
Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition Learning Python for Forensics. Leverage the power of Python in forensic investigations - Second Edition
-
The serverless architecture allows you to build and run applications and services without having to manage the infrastructure which saves cost and improves scalability. In this book, you will learn to harness serverless technology to reduce production time, minimize cost and have the freedom to customize your code, without hindering functionality.
- PDF + ePub + Mobi pkt
Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS Serverless Programming Cookbook. Practical solutions to building serverless applications using Java and AWS
-
This is a comprehensive guide to help you understand the current threats faced by the financial cyberspace and how to go about it and secure your financial landscape. The book will take you on a journey from identifying the attackers to securing your financial transactions and assets. The book then take you through the updates needed for procedures
- PDF + ePub + Mobi pkt
Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches Hands-On Cybersecurity for Finance. Identify vulnerabilities and secure your financial services from security breaches
-
Functional programming is a very powerful programming paradigm that can help us to write better code. This book presents essential functional and reactive programming concepts in a simplified manner using Typescript.
- PDF + ePub + Mobi pkt
Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications Hands-On Functional Programming with TypeScript. Explore functional and reactive programming to create robust and testable TypeScript applications
-
Mastering Kali Linux for Advanced Penetration Testing, Third Edition will guide you through proven techniques to test your infrastructure security using Kali Linux. From selecting the most effective tools to carrying out advanced pentesting in highly secure environments, this book will help you gain the expertise you need to advance in your career.
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition Mastering Kali Linux for Advanced Penetration Testing. Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit - Third Edition
-
Blockchain has the potential to change the world and has become the hottest field in the tech sector now. Blockchain for Business is a comprehensive guide that enables you to fully understand the far-reaching applications beyond Bitcoin and empowers you to make fully-informed decisions.
- PDF + ePub + Mobi pkt
Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications Blockchain for Business 2019. A user-friendly introduction to blockchain technology and its business applications
-
Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. Learn blockchain from first concepts to algorithms explained in Python.
- PDF + ePub + Mobi pkt
Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications Foundations of Blockchain. The pathway to cryptocurrencies and decentralized blockchain applications
-
IoT and Blockchain are not limited to certain industries or use cases. Almost any business with a network and IoT device can reduce costs, improve business efficiency, and remove single points of failure in networks by implementing Blockchain. This book will help you implement an end-to-end Blockchain and IoT solution using best practices.
- PDF + ePub + Mobi pkt
Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions Hands-On IoT Solutions with Blockchain. Discover how converging IoT and blockchain can help you build effective solutions
-
The book will allow readers to implement smart solutions to their existing cybersecurity products and effectively build intelligent solutions which cater to the needs of the future. By the end of this book, you will be able to build, apply, and evaluate machine learning algorithms to identify various cybersecurity potential threats.
- PDF + ePub + Mobi pkt
Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem Hands-On Machine Learning for Cybersecurity. Safeguard your system by making your machines intelligent using the Python ecosystem
-
Hands-On Enterprise Application Development with Python explains how Python has matured to become a suitable programming language to build robust applications that scale easily to manage the requirements of the enterprise. The book will explore features of Python 3.7, tested frameworks and tools and best programming practices for developing scalabl
- PDF + ePub + Mobi pkt
Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3 Hands-On Enterprise Application Development with Python. Design data-intensive Application with Python 3
-
This book will introduce you to Android forensics helping you to set up a forensic environment, handle mobile evidence, analyze how and where common applications store their data. You will also learn to identify malware on a device, and how to analyze it.
- PDF + ePub + Mobi pkt
Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition Learning Android Forensics. Analyze Android devices with the latest forensic tools and techniques - Second Edition
-
C++ is a general-purpose programming language with a bias towards systems programming. This book provides a detailed walkthrough of the C, C++ and POSIX standards and enables a firm understanding of various system calls for UNIX systems. Topics include console and file IO, memory management, sockets, time interface, process and thread management
- PDF + ePub + Mobi pkt
Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17 Hands-On System Programming with C++. Build performant and concurrent Unix and Linux systems with C++17
-
Understanding the history of the Deep Web, its current state, and its possible evolution, can help you, the reader; better understand the dangers and risks that exist out there. This book helps you access the Deep Web and the Dark Net and also protect yourself while browsing the Deep Web.
- PDF + ePub + Mobi pkt
Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it Hands-On Dark Web Analysis. Learn what goes on in the Dark Web, and how to work with it
-
Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions.
- PDF + ePub + Mobi pkt
CentOS Quick Start Guide. Get up and running with CentOS server administration CentOS Quick Start Guide. Get up and running with CentOS server administration
-
Microsoft Azure is a cloud computing platform that helps you build, deploy, and manage applications to overcome your business challenges. This book covers the commonly used Azure services and also explains how you effectively integrate and utilize them.
- PDF + ePub + Mobi pkt
Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem Learn Microsoft Azure. Build, manage, and scale cloud applications using the Azure ecosystem
-
Swift is continuing to gain traction not only amongst mobile developers but also as a server-side language. This book demonstrates how to apply design patterns and best practices in real-life situations, for new or already existing projects. By the end of the book, you’ll able to build applications that are scalable, faster and easier to ma
- PDF + ePub + Mobi pkt
Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms Hands-On Design Patterns with Swift. Master Swift best practices to build modular applications for mobile, desktop, and server platforms
-
Blockchain Developer's Guide will show you how to create distributed blockchain applications which do not depend on a central server or datacenter. Starting with the basic principles of blockchain architecture exploring cryptography, you will then study consensus protocols, initial coin offerings, crypto-mining, DApp deployment, Ethereum applicatio
- PDF + ePub + Mobi pkt
Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda Blockchain Developer's Guide. Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
-
pfSense is a FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. This book focuses on configuring essential and other commonly used pfSense services; such as traffic shaping, redundancy, high availability, static and dynamic routing, backup and restoration of pfSense, and diagnostic tools.
- PDF + ePub + Mobi pkt
pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition pfSense 2.x Cookbook. Manage and maintain your network using pfSense - Second Edition
-
Bug Bounty hunting is a new method which companies use to test their applications. There is no dedicated methodology in place right now to help researchers upskill themselves and become bug bounty hunters, that is why there is ambiguity as to what the field is about, the book solves that problem. The book allows readers to train themselves as bug b
- PDF + ePub + Mobi pkt
Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs Bug Bounty Hunting Essentials. Quick-paced guide to help white-hat hackers get through bug bounty programs
-
This book covers all the relevant concepts and phases of the blockchain development cycle. It will walk you through a step-by-step process to build three blockchain projects with differing complexity levels and hurdles. By the end of this book, you will be ready to tackle common issues in the blockchain ecosystem.
- PDF + ePub + Mobi pkt
Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger Blockchain By Example. A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
-
Mastering Vim will introduce you to the wonderful world of Vim by example of working with Python code and tools in a project-based fashion. This book will prompt you to make Vim your primary IDE as you will learn to use it for any programming language.
- PDF + ePub + Mobi pkt
Mastering Vim. Build a software development environment with Vim and Neovim Mastering Vim. Build a software development environment with Vim and Neovim
-
Docker is an open source software platform that helps you with creating, deploying, and running your applications using containers. This book is your ideal introduction to Docker and containerization.
- PDF + ePub + Mobi pkt
Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications Docker Quick Start Guide. Learn Docker like a boss, and finally own your applications
-
Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master the art of using reverse engineering.
- PDF + ePub + Mobi pkt
Mastering Reverse Engineering. Re-engineer your ethical hacking skills Mastering Reverse Engineering. Re-engineer your ethical hacking skills
-
In this book, you’ll build a complete system with both back-end and front-end products, including ASP.NET Core, Entity Framework, TypeScript, Angular, React, Vue, and Azure. This book covers more than just implementation, as you gain additional knowledge in more relevant areas, including deployment, monitoring, and debugging.
- PDF + ePub + Mobi pkt
Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue Hands-On Full-Stack Web Development with ASP.NET Core. Learn end-to-end web development with leading frontend frameworks, such as Angular, React, and Vue
-
Selenium WebDriver is a platform-independent API for automating testing of both browser and mobile applications. It is also a core technology in many other browser automation tools, APIs and frameworks. This book will guide you through the WebDriver APIs that are used in automation tests.
- PDF + ePub + Mobi pkt
Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3 Selenium WebDriver Quick Start Guide. Write clear, readable, and reliable tests with Selenium WebDriver 3
-
This second edition of Kali Linux 2: Windows Penetration Testing provides approaches and solutions to the issues of modern penetration testing for a Microsoft Windows environment. As a pen tester, you need to be able to understand and use the best available tools - this book addresses these needs with maximum in a cost and time efficient way.
- PDF + ePub + Mobi pkt
Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition Kali Linux 2018: Windows Penetration Testing. Conduct network testing, surveillance, and pen testing on MS Windows using Kali Linux 2018 - Second Edition
-
In recent years, the C# and .NET ecosystem has grown so explosively that it's nearly impossible to keep up. This collection of programming challenges helps you explore some of the less-traveled byways of programming concepts in general and C# in particular.
- PDF + ePub + Mobi pkt
The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems
-
Promocja
Książka obejmuje wyjątkowy zestaw tematów, którego nie znajdziesz nigdzie indziej i odpowiada na pytanie, jak przezwyciężyć przeszkody wyłaniające się wraz z rozwojem rynku i rozpowszechnianiem w świadomości konsumentów start-upów opartych na blockchainie. Książkę otwiera szkic o historii technologii blockchain i omówienie podstaw kryptografii, na- ePub + Mobi pkt
(59,20 zł najniższa cena z 30 dni)
59.20 zł
74.00 zł(-20%) -
Blockchain across Oracle is a professional orientation for Oracle developers to get up to speed with the details and implications of the Blockchain across Oracle. Learn everything from Blockchain concepts, through to working with Oracle Blockchain Cloud Service, expert guidance on the effects of the Blockchain on key markets, and the impact to Orac
- PDF + ePub + Mobi pkt
Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers Blockchain across Oracle. Understand the details and implications of the Blockchain for Oracle developers and customers
-
Tokenomics is the economy of the new world of cryptocurrencies, blockchain, and ICOs. This book is a deep-dive into the economics and technology of tokens, and how this will lead to a new tokenized economy. This is a no-holds-barred, in-depth exploration of how it all works, and how you can participate in tokenizing the world.
- PDF + ePub + Mobi pkt
Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens
-
CompTIA Security+ Certification Guide makes the most complex Security+ concepts easy to understand despite having no prior knowledge. It offers exam tips in every chapter along with access to practical exercises and exam checklist that map to the exam objectives and it is the perfect study guide to help you pass CompTIA Security+ SY0-501 exam.
- PDF + ePub + Mobi pkt
CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification CompTIA Security+ Certification Guide. Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification
-
Java is one of the most commonly used software languages by programmers and developers. Are you from a non-technical background looking to master Java for your automation needs? Then Hands-On Automation Testing with Java for Beginners is for you.
- PDF + ePub + Mobi pkt
Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java Hands-On Automation Testing with Java for Beginners. Build automation testing frameworks from scratch with Java
-
Industrial Internet is the integration of complex physical machines and networked sensors and software. Increasing the number of sensors in industrial equipment is going to increase the data being captured, which needs to be analyzed. This book is a one-stop guide for software professionals to design, build, manage, and operate IIoT applications.
- PDF + ePub + Mobi pkt
Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services
Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera Kishore Reddipalli
-
Network Scanning Cookbook enables a reader to understand how to perform a Network Scan, which includes Discovery, Scanning, Enumeration, Vulnerability detection etc using scanning tools like Nessus and Nmap. If the reader is an auditor, they will be able to determine the security state of the client's network and recommend remediations accordingly.
- PDF + ePub + Mobi pkt
Network Scanning Cookbook. Practical network security using Nmap and Nessus 7 Network Scanning Cookbook. Practical network security using Nmap and Nessus 7
-
Nowadays, configuring a network and automating security protocols are quite difficult to implement. However, using Python makes it easy to automate this whole process. This book explains the process of using Python for building networks, detecting network errors, and performing different security protocols using Python Scripting.
- PDF + ePub + Mobi pkt
Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues Mastering Python for Networking and Security. Leverage Python scripts and libraries to overcome networking and security issues
-
Red teaming is a process in which you use an attacker-like approach to secure your system, data, and network from getting breached. The main goal of the book is to equip the readers with the means to a smooth transition from a pen tester to a red teamer by focusing on the uncommon yet effective methods in a red teaming activity.
- PDF + ePub + Mobi pkt
Hands-On Red Team Tactics. A practical guide to mastering Red Team operations Hands-On Red Team Tactics. A practical guide to mastering Red Team operations
-
This book will help you build real-world decentralized blockchain applications highlighting the principles of peer-to-peer systems, smart contracts, interoperability, privacy and more. You will be aware of the process flow and the growing company needs so you can incorporate and scale them in your own enterprise
- PDF + ePub + Mobi pkt
Blockchain for Enterprise. Build scalable blockchain applications with privacy, interoperability, and permissioned features Blockchain for Enterprise. Build scalable blockchain applications with privacy, interoperability, and permissioned features
-
The purpose of the Burp Suite Cookbook is to provide web application penetration testers with hands-on examples of how to use Burp Suite to perform web assessments. The book gives detailed screenshots demonstrating how to perform various attacks in Burp including Cross-site Scripting (XSS), SQL Injection, Cross-site Request Forgery, XML External E
- PDF + ePub + Mobi pkt
Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite Burp Suite Cookbook. Practical recipes to help you master web penetration testing with Burp Suite
-
This book will provide you with practical recipes to manage the build system using CMake. You will be taken through a series of task-based examples that demonstrate how to employ the CMake toolbox to build portable and modular code and to minimize the code complexity of the build infrastructure.
- PDF + ePub + Mobi pkt
CMake Cookbook. Building, testing, and packaging modular software with modern CMake CMake Cookbook. Building, testing, and packaging modular software with modern CMake
-
Viktor Farcic’s latest book, The DevOps 2.3 Toolkit: Kubernetes, will take you on a hands-on journey with Viktor into the world of Kubernetes, and the tools not only behind the official project but also the wide-range of third-party apps that are available for you to use.
- PDF + ePub + Mobi pkt
The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale The DevOps 2.3 Toolkit. Kubernetes: Deploying and managing highly-available and fault-tolerant applications at scale
-
Bug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively—and profitably—participating in bug bounty programs.
- PDF + ePub + Mobi pkt
Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws Hands-On Bug Hunting for Penetration Testers. A practical guide to help ethical hackers discover web application security flaws
-
Ethereum is an open-source, public, Blockchain-based distributed computing platform, and operating system featuring smart contract functionality which builds decentralized applications. If you want to get started with Ethereum and Solidity or you are among the many developers already working with this platform, this book is your one-stop guide.
- PDF + ePub + Mobi pkt
Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps Ethereum Cookbook. Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
-
Kotlin is a general purpose, object-oriented language that primarily targets the JVM and Android. Intended to be a better alternative to Java, its main goals are high interoperability with Java and increased developer productivity. Kotlin is still a new language and this book will help you to learn the core Kotlin features and get your ready for d
- PDF + ePub + Mobi pkt
Kotlin Quick Start Guide. Core features to get you ready for developing applications Kotlin Quick Start Guide. Core features to get you ready for developing applications
-
Blockchain and Bitcoin are currently the talk of the town. This book will start with an introduction to the fundamental concepts of Blockchain and it will take you through its various features and challenges. By the end of this book, you will learn to implement the Blockchain technology for securing your cryptocurrency.
- PDF + ePub + Mobi pkt
Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications Learn Bitcoin and Blockchain. Understanding blockchain and Bitcoin architecture to build decentralized applications
-
Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model.
- PDF + ePub + Mobi pkt
Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure Network Vulnerability Assessment. Identify security loopholes in your network’s infrastructure
-
Real-World SRE is a practical guide for surviving a system outage. Nat Welch’s step-by-step framework will help you to navigate a crisis when the stakes are high.
- PDF + ePub + Mobi pkt
Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime
-
Bitcoin is a cryptocurrency that’s changing the face of online payments. This book will help you understand everything related to Bitcoin architecture. By the end, you’ll be able to mine Bitcoins, accept Bitcoin payments, and work with the basics of Blockchain technology to create simple distributed ledgers.
- PDF + ePub + Mobi pkt
Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python Hands-On Bitcoin Programming with Python. Build powerful online payment centric applications with Python
-
This book is a comprehensive guide to help developers, architects, and senior programmers advance their career in the software architecture domain. You'll understand the expectations of users and other stakeholders from the point of view of an architect and will learn to communicate your architecture to the relevant stakeholders.
- PDF + ePub + Mobi pkt
Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts Software Architect's Handbook. Become a successful software architect by implementing effective architecture concepts
-
This book applies the core principles and ideas of Blockchain in your existing applications. You will understand the key areas of Blockchain architecture along with the challenges faced with an easy-to-follow guide. You will not only be able to solve current and future problems around Blockchain but also build efficient decentralized applications.
- PDF + ePub + Mobi pkt
Blockchain Quick Reference. A guide to exploring decentralized blockchain application development Blockchain Quick Reference. A guide to exploring decentralized blockchain application development
-
Security is one of the most vital concerns for any organization. The complexity of an application is compounded when you need to integrate security with existing code, new technology, and other frameworks. This book will show you how to effectively write Java code that is robust and easy to maintain.
- PDF + ePub + Mobi pkt
Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux Hands-On Spring Security 5 for Reactive Applications. Learn effective ways to secure your applications with Spring and Spring WebFlux
-
This book is designed to help you learn the basics, it assumes that you have no prior knowledge in hacking, and by the end of it you'll be at a high intermediate level being able launch attacks and hack computer systems just like black-hat hackers do, not only that but you'll also learn how to secure systems from these attacks.
- PDF + ePub + Mobi pkt
Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing Learn Ethical Hacking from Scratch. Your stepping stone to penetration testing
-
This book covers everything the reader needs to know to get pfSense up and running, as well as how to configure core pfSense services to both secure and optimize their networks, third party packages that extend the functionality of pfSense, and the basics of diagnostics and troubleshooting networks.
- PDF + ePub + Mobi pkt
Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions Learn pfSense 2.4. Get up and running with Pfsense and all the core concepts to build firewall and routing solutions
-
Penetration testing is highly competitive, and it’s easy to get stuck in the same routine client after client. This book will provide hands-on experience with penetration testing while guiding you through behind-the-scenes action along the way.
- PDF + ePub + Mobi pkt
Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
-
Hands-On Security in DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide through risk management and training.
- PDF + ePub + Mobi pkt
Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps Hands-On Security in DevOps. Ensure continuous security, deployment, and delivery with DevSecOps
-
pfSense is the world's most trusted open source network security solution. In this book, you’ll learn about pfSense, all of its key features, how you can install and deploy it, as well as the different tasks you can perform.
- PDF + ePub + Mobi pkt
Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls Network Security with pfSense. Architect, deploy, and operate enterprise-grade firewalls
-
This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge to the cloud.
- PDF + ePub + Mobi pkt
Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries Practical Industrial Internet of Things Security. A practitioner's guide to securing connected industries
-
Amazon Lambda is the part of Amazon Web Services that lets you run your code without provisioning or managing servers. Amazon Lambda is a compute service that enables you to deploy applications and back-end services that operate with zero upfront cost and require no system administration.
- PDF + ePub + Mobi pkt
AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS AWS Lambda Quick Start Guide. Learn how to build and deploy serverless applications on AWS
-
In an era of fast-paced change and unprecedented technological innovation, businesses are struggling to survive. This practical book will prepare your organization to adapt and excel. Learn how adopting Agile ways of working and increasing Agility will propel your company to success in competitive markets.
- PDF + ePub + Mobi pkt
Enterprise Agility. Being Agile in a Changing World Enterprise Agility. Being Agile in a Changing World
-
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.
- PDF + ePub + Mobi pkt
Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data Hands-On Cryptography with Python. Leverage the power of Python to encrypt and decrypt data
-
Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. This book teaches you the concepts, tools, and techniques to determine the behavior and characteristics of malware using malware analysis and memory forensics.
- PDF + ePub + Mobi pkt
Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware Learning Malware Analysis. Explore the concepts, tools, and techniques to analyze and investigate Windows malware
-
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.
- PDF + ePub + Mobi pkt
Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain Hands-On Cybersecurity with Blockchain. Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
-
Having a knowledge of design patterns enables you, as a developer, to improve your code base, promote code reuse, and make the architecture more robust. As languages evolve, new features take time to fully understand before they are adopted en masse. The mission of this book is to ease the adoption of the latest trends and provide good practices fo
- PDF + ePub + Mobi pkt
Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java Design Patterns and Best Practices in Java. A comprehensive guide to building smart and reusable code in Java
-
This book will walk you through the web application penetration testing methodology, showing you how to write your own tools with Python for every main activity in the process. It will show you how to test for security vulnerabilities in web applications just like security professionals and hackers do.
- PDF + ePub + Mobi pkt
Learning Python Web Penetration Testing. Automate web penetration testing activities using Python Learning Python Web Penetration Testing. Automate web penetration testing activities using Python
-
We live in an era where cyber security plays an important role. As systems are getting smarter, we now see machine learning interrupting computer security. With the adoption of machine learning in upcoming security products, it’s important for pentesters and security researchers to understand how these systems work, and to breach them for te
- PDF + ePub + Mobi pkt
Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python Mastering Machine Learning for Penetration Testing. Develop an extensive skill set to break self-learning systems using Python
-
Wireshark is a powerful tool for network analysis, a combination of Kali Linux and the Metasploit framework. Wireshark is used to analyze the amount of data that flows through a network - it lets you see what's going on in your network. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.
- PDF + ePub + Mobi pkt
Wireshark 2 Quick Start Guide. Secure your network through protocol analysis Wireshark 2 Quick Start Guide. Secure your network through protocol analysis
-
The Google Cloud Platform is fast emerging as a leading public cloud provider. The GCP, as it is popularly known, is backed by Google’s awe-inspiring engineering expertise and infrastructure and is able to draw upon the goodwill and respect that Google has come to enjoy. The GCP is one of a handful of public cloud providers to offer the full
- PDF + ePub + Mobi pkt
Google Cloud Platform for Architects. Design and manage powerful cloud solutions Google Cloud Platform for Architects. Design and manage powerful cloud solutions
-
Web Applications are the core of any business today, and the need for specialized Application Security experts is increasing these days. Using this book, you will be able to learn Application Security testing and understand how to analyze a web application, conduct a web intrusion test, and a network infrastructure test.
- PDF + ePub + Mobi pkt
Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more Practical Web Penetration Testing. Secure web applications using Burp Suite, Nmap, Metasploit, and more
-
With concrete exercises and examples this book will help you to understand how to deploy a Hyperledger Fabric network. It then proceeds to explain the steps in developing a full fledged decentralized application. You will not only learn how to plan, design and create private networks but also evolve the network as per organizational needs.
- PDF + ePub + Mobi pkt
Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer Hands-On Blockchain with Hyperledger. Building decentralized applications with Hyperledger Fabric and Composer
Nitin Gaur, Luc Desrosiers, Venkatraman Ramakrishna, Petr Novotny, Salman A. Baset, Anthony O'Dowd
-
With a CCNA Security certification, you can demonstrate the skills required to develop a security infrastructure, recognize threats to networks, and mitigate security threats. Geared towards Cisco Security, the practical aspects of this book will help you clear the CCNA Security Exam (210-260) by increasing your knowledge of Network Security.
- PDF + ePub + Mobi pkt
CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260) CCNA Security 210-260 Certification Guide. Build your knowledge of network security and pass your CCNA Security exam (210-260)
-
A balance between implementing complex applications and optimizing performance is a present-day need. This book helps you achieve this balance while developing and deploying applications with Kotlin. You will learn how to use profiling tools to detect performance issues and discover bytecode that is generated to overcome performance bottlenecks.
- PDF + ePub + Mobi pkt
Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions Mastering High Performance with Kotlin. Overcome performance difficulties in Kotlin with a range of exciting techniques and solutions
-
Lean Product Management is a handy guide for product managers and anyone embarking on new product development. This book will help readers to align their product strategy by identifying the most viable product, setting up and measuring time-bound metrics, developing a clear product roadmap, and eliminating waste.
- PDF + ePub + Mobi pkt
Lean Product Management. Successful products from fuzzy business ideas Lean Product Management. Successful products from fuzzy business ideas
-
Wireshark, a combination of Kali and Metasploit, deals with the second to the seventh layer of network protocols. The book will introduce to various protocol analysis methods and will teach you how to analyze them. You will discover and work with some advanced features which will enhance the capabilities of your application. By the end, you will be
- PDF + ePub + Mobi pkt
Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats Mastering Wireshark 2. Develop skills for network analysis and address a wide range of information security threats
-
Microservices has evolved as one of the most tangible solutions to make effective and scalable applications. Due to its evolution from ES5 to ES6 stack, Typescript has become one of the most de facto solutions. This book will help you leverage microservices’ power to build robust architecture using reactive programming and Typescript in Node
- PDF + ePub + Mobi pkt
TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js TypeScript Microservices. Build, deploy, and secure Microservices using TypeScript combined with Node.js
-
Metasploit is a popular penetration testing framework that has one of the largest exploit databases around. This book will show you exactly how to prepare yourself for the attacks you will face every day by simulating real-world possibilities.
- PDF + ePub + Mobi pkt
Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition Mastering Metasploit. Take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit - Third Edition
-
Network administrators use network scanning tools to build a network inventory and to perform security audits by examining active hosts on a network with the help of IP address ranges. The same principles can also be used in cyber attacks to find weaknesses in a system. This book will help you not only find flaws but also strengthen the security of
- PDF + ePub + Mobi pkt
Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus Practical Network Scanning. Capture network vulnerabilities using standard tools such as Nmap and Nessus
-
With constantly changing business requirements and technical environments, the code needs to evolve too. Building applications using test-driven development process ensures that they work properly irrespective of such changes. In this book, you will learn to make such robust and production-ready applications with C# and .NET.
- PDF + ePub + Mobi pkt
C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications C# and .NET Core Test Driven Development. Dive into TDD to create flexible, maintainable, and production-ready .NET Core applications
-
A key problem of software development today is the software bloat, where huge toolchains and development environments are needed in software coding and deployment. Red significantly reduces this bloat by offering a minimal but complete toolchain. This is the first introductory book on Red, and it will get you up and running as quickly as possible.
- PDF + ePub + Mobi pkt
Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development Learn Red - Fundamentals of Red. Get up and running with the Red language for full-stack development
-
pfSense is open source router/firewall software based on FreeBSD. This book shows how to install and customize pfSense in a variety of scenarios, providing many concrete examples.
- PDF + ePub + Mobi pkt
Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition Mastering pfSense. Manage, secure, and monitor your on-premise and cloud network with pfSense 2.4 - Second Edition
-
This book will equip you with a holistic understanding of 'social engineering'. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware.
- PDF + ePub + Mobi pkt
Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert Learn Social Engineering. Learn the art of human hacking with an internationally renowned expert
-
Windows Server 2016 is an operating system designed to run on today’s highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the s
- PDF + ePub + Mobi pkt
Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016 Windows Server 2016 Security, Certificates, and Remote Access Cookbook. Recipe-based guide for security, networking and PKI in Windows Server 2016
-
Python is an easy-to-learn and cross-platform programming language which has unlimited third-party libraries. Plenty of open source hacking tools are written in Python and can be easily integrated within your script. This book is divided into clear bite-size chunks so you can learn at your own pace and focus on the areas of most interest to you. Yo
- PDF + ePub + Mobi pkt
Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python Python For Offensive PenTest. A practical guide to ethical hacking and penetration testing using Python
-
Serverless architectures allow you to build and run applications and services without having to manage the infrastructure. Many companies have adopted this architecture to save cost and improve scalability. This book will help you design serverless architectures for your applications with AWS and Python.
- PDF + ePub + Mobi pkt
Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available Building Serverless Applications with Python. Develop fast, scalable, and cost-effective web applications that are always available
-
Organizations have started to adapt to hybrid cloud solutions in order to leverage advantages such as untested workloads, cloud-bursting, cloud service brokering, and more. The major goal of this book is to help developers maximize their existing skills and overcome the complexities of developing flexible and unified apps on the cloud.
- PDF + ePub + Mobi pkt
Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease Hybrid Cloud for Developers. Develop and deploy cost-effective applications on the AWS and OpenStack platforms with ease
-
Serverless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes. For good reason, serverless-based applications handle many of the problems developers face when running systems and servers such as fault-tolerance, centralized logging, horizontal scalability, and deployments, to name a few. Ad
- PDF + ePub + Mobi pkt
Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity Serverless Design Patterns and Best Practices. Build, secure, and deploy enterprise ready serverless applications with AWS to improve developer productivity
-
Kubernetes provides a means to describe what your application needs and how it should run by orchestrating containers on your behalf to operate your software across a single, dozens, or hundreds of machines. Originally created and open sourced from Google, you can use their technology to help run, test, and scale your applications regardless of whi
- PDF + ePub + Mobi pkt
Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers Kubernetes for Developers. Use Kubernetes to develop, test, and deploy your applications with the help of containers
-
Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. The blockchain technology is the backbone of cryptocurrency and it is gaining popularity with people who work in the finance, government, and arts sectors. This book is an up-to-date, one-stop guide to this leading technology and its implementation
- PDF + ePub + Mobi pkt
Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition Mastering Blockchain. Distributed ledger technology, decentralization, and smart contracts explained - Second Edition
-
This book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. By the end of this book, you’ll know how to analyze the traffic, find patterns of various offending tra
- PDF + ePub + Mobi pkt
Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition Network Analysis using Wireshark 2 Cookbook. Practical recipes to analyze and secure your network using Wireshark 2 - Second Edition
-
Promocja
Oto Franek Runtime skompromitowany eks-komisarz, bezduszny detektyw, ekspert poszukiwań. Gdy komenda główna policji zostaje obrabowana, to Franek Runtime i jego niezwykłe umiejętności pozwolą schwytać winnych. W tym opowiadaniu kryminalnym dowiesz się jak korzystać z narzędzi algorytmicznych, aby rozwiązać sprawę. Franek Runtime binarnie prz- ePub + Mobi pkt
Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach Komputerowy detektyw. Algorytmiczna opowieść o przestępstwach, spiskach i obliczeniach
(51,20 zł najniższa cena z 30 dni)
51.20 zł
64.00 zł(-20%) -
Continuous deployment and Agile methodology have enabled huge advances in modern applications. This book will enable the reader to make use of this rapidly evolving technology to build highly scalable applications within AWS using different architectures.
- PDF + ePub + Mobi pkt
Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform Expert AWS Development. Efficiently develop, deploy, and manage your enterprise apps on the Amazon Web Services platform
-
VMware NSX is a software-based networking and security virtualization platform that delivers an operational model of a virtual machine for the network. By virtualizing the network, NSX breaks through current physical network barriers and enables data center operators to achieve better speed and agility with reduced costs.
- PDF + ePub + Mobi pkt
VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere VMware NSX Cookbook. Over 70 recipes to master the network virtualization skills to implement, validate, operate, upgrade, and automate VMware NSX for vSphere
-
In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best security
- PDF + ePub + Mobi pkt
Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack Cloud Security Automation. Get to grips with automating your cloud security on AWS and OpenStack
-
Viktor Farcic’s latest book, The DevOps 2.2 Toolkit: Self-Sufficient Docker Clusters, takes you deeper into Docker, teaching you with a mixture of theory and hands-on how to successfully build both self-adaptive and self-healing-based systems.
- PDF + ePub + Mobi pkt
The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters The DevOps 2.2 Toolkit. Self-Sufficient Docker Clusters
-
Customizing networks and controlling the traffic flow is becoming a must for all the modern solutions, even if these solutions exist on Azure, on-premises or a combination of both.In this book, you will learn all Azure networking solutions and spanning them across Azure and On-premises, and how to build a highly available environment by them.
- PDF + ePub + Mobi pkt
Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions Hands-On Networking with Azure. Build large-scale, real-world apps using Azure networking solutions